First published: Wed Oct 30 2024(Updated: )
In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doGRETunnel function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DrayTek Vigor Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51298 is rated as a high-severity vulnerability due to the potential for remote command execution.
To fix CVE-2024-51298, update Draytek Vigor3900 to the latest version that addresses this vulnerability.
Exploiting CVE-2024-51298 allows attackers to execute arbitrary commands with the privileges of the web server.
CVE-2024-51298 specifically affects the Draytek Vigor3900 running version 1.5.1.3.
Yes, CVE-2024-51298 can be exploited remotely since it involves command injection through a vulnerable CGI script.